Interim Proficiency Assessments Clause Samples

The Interim Proficiency Assessments clause establishes periodic evaluations of a party’s skills or knowledge during the course of a project or training program. These assessments are typically scheduled at set intervals and may involve tests, demonstrations, or other forms of measurement to ensure ongoing progress toward required standards. By implementing these interim checks, the clause helps identify areas needing improvement early, ensuring that participants remain on track and reducing the risk of final failure or non-compliance.
Interim Proficiency Assessments. In addition to the audit described in Section 5.2, from time to time, and not more than once per calendar year, the Evaluation Laboratory, and each of its Accredited Facilities engaged in security evaluations, shall perform proficiency tests requested by GP. GP shall be free to establish the terms and conditions of the assessment, the purpose of which is to assess whether the Evaluation Laboratory, and each of the Accredited Facilities engaged in security evaluations, is performing Product security evaluations in accordance with GP’s Security Requirements.
Interim Proficiency Assessments. In addition to the audit described in Section 5.2, from time to time, and not more than once per calendar year, the CB and each of its Licensed Facilities engaged in SESIP certifications, shall perform proficiency tests requested by GP. GP shall be free to establish the terms and conditions of the assessment, the purpose of which is to assess whether the CB, and each of the Licensed Facilities engaged in SESIP certifications, is performing Product SESIP certifications in accordance with GP’s Security Requirements.

Related to Interim Proficiency Assessments

  • Security Assessments Upon advance written notice by the JBE, Contractor agrees that the JBE shall have reasonable access to Contractor’s operational documentation, records, logs, and databases that relate to data security and the Contractor’s Information Security Program. Upon the JBE’s request, Contractor shall, at its expense, perform, or cause to have performed an assessment of Contractor’s compliance with its privacy and data security obligations. Contractor shall provide to the JBE the results, including any findings and recommendations made by Contractor’s assessors, of such assessment, and, at its expense, take any corrective actions.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Conformity Assessment Procedures 1. Each Party shall give positive consideration to accepting the results of conformity assessment procedures of other Parties, even where those procedures differ from its own, provided it is satisfied that those procedures offer an assurance of conformity with applicable technical regulations or standards equivalent to its own procedures. 2. Each Party shall seek to enhance the acceptance of the results of conformity assessment procedures conducted in the territories of other Parties with a view to increasing efficiency, avoiding duplication and ensuring cost effectiveness of the conformity assessments. In this regard, each Party may choose, depending on the situation of the Party and the specific sectors involved, a broad range of approaches. These may include but are not limited to: (a) recognition by a Party of the results of conformity assessments performed in the territory of another Party; (b) recognition of co-operative arrangements between accreditation bodies in the territories of the Parties; (c) mutual recognition of conformity assessment procedures conducted by bodies located in the territory of each Party; (d) accreditation of conformity assessment bodies in the territory of another Party; (e) use of existing regional and international multilateral recognition agreements and arrangements; (f) designating conformity assessment bodies located in the territory of another Party to perform conformity assessment; and (g) suppliers’ declaration of conformity. 3. Each Party shall exchange information with other Parties on its experience in the development and application of the approaches in Paragraph 2(a) to (g) and other appropriate approaches with a view to facilitating the acceptance of the results of conformity assessment procedures. 4. A Party shall, upon request of another Party, explain its reasons for not accepting the results of any conformity assessment procedure performed in the territory of that other Party.

  • Risk Assessments a. Risk Assessment - DST shall, at least annually, perform risk assessments that are designed to identify material threats (both internal and external) against Fund Data, the likelihood of those threats Schedule 10.2 p.2 occurring and the impact of those threats upon DST organization to evaluate and analyze the appropriate level of information security safeguards (“Risk Assessments”). b. Risk Mitigation - DST shall use commercially reasonable efforts to manage, control and remediate threats identified in the Risk Assessments that it believes are likely to result in material unauthorized access, copying, use, processing, disclosure, alteration, transfer, loss or destruction of Fund Data, consistent with the Objective, and commensurate with the sensitivity of the Fund Data and the complexity and scope of the activities of DST pursuant to the Agreement. c. Security Controls Testing - DST shall, on approximately an annual basis, engage an independent external party to conduct a review (including information security) of DST’s systems that are related to the provision of services. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Joint Assessment If the Premises are not separately assessed, Lessee's liability shall be an equitable proportion of the Real Property Taxes for all of the land and improvements included within the tax parcel assessed, such proportion to be conclusively determined by Lessor from the respective valuations assigned in the assessor's work sheets or such other information as may be reasonably available.